Information Security



Hosted security services
1 July 2015, Security Services & Risk Management
Cloud services can be useful, cost effective and beneficial, but take care of your security first. Michael Horn, BU manager for security at CA Southern Africa elaborates on being secure out in the great wide Internet.

Read more...
Complete solution for three KZN schools
July 2015, MiRO, Surveillance
Three KZN schools opt for wireless networks for Internet access and security surveillance.

Read more...
The increasing pace of technology advancement
June 2015, News & Events, Editor's Choice
The trouble with thinking about technology advancements is that the rate of past progress does not predict the rate of future progress.

Read more...
Layered approach to prevent watering hole attacks
1 June 2015
A layered approach based on a combination of checks and balances, along with various key technologies, is the most comprehensive method of preventing so-called watering hole malware attacks.

Read more...
Mobile content security and enterprise collaboration boosted
1 June 2015, Integrated Solutions
BlackBerry announced that it has entered into a definitive agreement to acquire WatchDox to further enhance its mobile security and give enterprises control over their files even after data leaves the corporate network.

Read more...
Driving PSIM through true SOA
1 June 2015, Surveillance
In any PSIM deployment, the day-to-day information load is relatively minimal. The challenge is the response to a sudden surge in this load, caused by a critical event or disaster scenario, comprised of multiple events happening at the same time.

Read more...
Stopping the leak
May 2015
The damage that data loss can do to an inadequately secured enterprise extends far beyond pecuniary matters and can include reputation loss, regulatory consequences, a decrease in customer confidence, trust issues, a drop in market share, and the development of trade barriers.

Read more...
Cyber risks severely underrated
1 May 2015, Integrated Solutions
South Africa is the fifth most targeted country in the world in terms of cybercrime attacks, while informal consensus within the private sector places SA third behind Russia and China.

Read more...
Detection and response
1 May 2015
Recent large-scale attacks move focus from blocking and detecting attacks, to detecting and responding to attacks. Gartner says by 2018, 40% of large organisations will have formal plans to address aggressive cyber-security business disruption attacks.

Read more...
Data security is essential for Government
May 2015, Government and Parastatal (Industry)
Cybercrime is a burgeoning threat, not only to business but also to governments all over the world. The increasing number of highly publicised examples of cybercrime highlights this trend.

Read more...
Anticipate, adapt, activate
April 2015
Annual global EY survey finds organisations are still unprepared for inevitable cyber attacks.

Read more...
Widening gulf between perception and reality
April 2015
Cisco unveils security manifesto as a foundation for organisations in South Africa to better understand and respond to today’s cybersecurity challenges.

Read more...
Experian SA launches new fraud prevention solution
1 April 2015, Security Services & Risk Management
Experian SA has launched the National Fraud Prevention Solution to address the significant threat of identity and credit application fraud in South Africa.

Read more...
Understanding intelligence
CCTV Handbook 2015
Intelligence is gained from many aspects of surveillance that does not necessarily require a picture. Information only becomes intelligent when it is used with all other available information to provide the basis for a decision and perhaps a result.

Read more...
Safer than Sony
1 March 2015
Carey van Vlaanderen, CEO of ESET Southern Africa, discusses three cyber security lessons learned from 2014’s most notorious hack.

Read more...
Security in the modern age
1 March 2015
It is now universally accepted that ever-increasing sophistication in technology, however ground-breaking it may be, brings with it a host of security challenges. The greater the innovation in how it’s ...

Read more...
Careless employees the greatest mobile threat
1 January 2015
Check Point’s third annual mobile security survey highlights careless employees as the greatest mobile security threat. 82% of security professionals expect the number of mobile security incidents to increase in 2015.

Read more...
IFSEC SA 2015 focuses on retaining data securely
November 2014, Security Services & Risk Management
Data storage and recovery has become big business as companies realise the true cost of losing all their strategic data to carelessness, fire or theft. Enterprise Strategy Group research indicates that ...

Read more...
Explosion of PoS RAM scrapers
November 2014
Local retailers need to be aware that these PoS threats are on the rise and 2014 has already seen the appearance of a number of new PoS RAM scraper families.

Read more...
Hacking a living room
October 2014
Popular connected home entertainment devices are a real cyber security threat due to vulnerabilities in their software, and a lack of elementary security measures such as strong default administrator passwords and encryption of Internet connection.

Read more...



<< First   < Previous   Page 52 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.